You are on page 1of 3

UNIT -1

Short Questions (2 Marks)

1. Briefly describe the evolution of information security.

 1960s - Early Computing: Focus on securing physical locations and hardware.


 1970s - Rise of Networked Computers: Emergence of network security protocols.
 1980s - Personal Computers: Increased awareness of malware and the need for
antivirus software.
 1990s - Internet Expansion: Development of firewalls and encryption protocols.
 2000s - Cybersecurity Era: Emphasis on data protection laws, identity theft, and
advanced persistent threats.
 2010s - Cloud and Mobile Computing: Focus on cloud security, mobile device
management, and IoT security.
 2020s - AI and Machine Learning: Integration of AI in threat detection and response.

2. What are the key aspects of the NSTISSC Security Model?

 Confidentiality: Protecting information from unauthorized disclosure.


 Integrity: Ensuring the accuracy and reliability of information.
 Availability: Guaranteeing timely and reliable access to information.
 Authentication: Verifying the identity of users accessing information.
 Non-repudiation: Ensuring that actions or commitments cannot be denied later.

3. Name critical components of an information system.

 Hardware: Includes servers, computers, routers, switches, and data storage devices.
 Software: Encompasses operating systems, applications, and security tools.
 Data: The core element, including databases, files, and multimedia.
 Networks: Communication systems like LAN, WAN, and the internet.
 People: Users, IT staff, and management who interact with the system.
 Processes: Procedures and policies governing the use and security of the system.

4. Why is it important to balance security and access in an information system?

 User Productivity: Excessive security measures can hinder user efficiency and
productivity.
 System Usability: Maintaining a user-friendly environment while ensuring security.
 Data Accessibility: Ensuring that data is available to authorized users when needed.
 Threat Mitigation: Balancing the need to protect against potential security threats.
 Regulatory Compliance: Meeting legal requirements without overburdening system
access.

5. Why is secure software development essential in modern information systems?


 Preventing Security Breaches: To avoid vulnerabilities that can lead to data theft or
system compromise.
 Protecting User Data: Ensuring the confidentiality and integrity of user data.
 Maintaining System Integrity: To prevent unauthorized changes or disruptions in
system functionality.
 Legal and Regulatory Compliance: Adhering to standards like GDPR, HIPAA, etc.
 Building Trust: Establishing and maintaining trust among users and stakeholders.
 Cost Efficiency: Preventing breaches can be less costly than addressing security
incidents post-development.

UNIT-2

Short Questions (2 Marks)

1. Name the major legal bodies involved in information security.

 International Bodies:
 Interpol: Facilitates international police cooperation.
 International Organization for Standardization (ISO): Develops standards like ISO/IEC
27001 for information security management.
 United States:
 Federal Trade Commission (FTC): Enforces laws against deceptive and unfair business
practices.
 National Institute of Standards and Technology (NIST): Develops cybersecurity standards
and guidelines.
 European Union:
 European Data Protection Board (EDPB): Oversees the application of the General Data
Protection Regulation (GDPR).

2. What is the role of ethics in information security?

 Trust Building: Establishes trust between users and organizations.


 Data Handling: Guides the ethical handling of sensitive and personal data.
 Decision Making: Influences ethical decision-making in security practices.
 Professional Conduct: Sets standards for professional conduct among security practitioners.
 Legal Compliance: Complements legal requirements by addressing areas not covered by law.

3. Identify the key element in the process of risk identification in information security.

 Asset Identification: Recognizing what needs protection, such as data, hardware, and software.
 Threat Recognition: Identifying potential threats that could exploit vulnerabilities.
 Vulnerability Assessment: Determining weaknesses in the system that could be exploited.
 Environmental Study: Understanding the external and internal environment that could impact
security.
4. Define the common risk control strategy used in information security.

 Preventive Controls: Aimed at preventing security incidents (e.g., firewalls, access controls).
 Detective Controls: Designed to detect and identify security incidents (e.g., intrusion detection
systems).
 Corrective Controls: Implemented to correct any issues after a security incident (e.g., patch
management).
 Deterrent Controls: Intended to discourage security violations (e.g., security policies, legal
consequences).

5. What is the main difference between quantitative and qualitative risk control practices?

 Quantitative: Involves numerical values and metrics to assess risk (e.g., statistical methods, cost-
benefit analysis).
 Qualitative: Based on subjective analysis and expert opinions (e.g., risk matrices, scenario
analysis)

6. Explain the professional issue commonly faced in the field of information security.

 Skill Gap: The industry often faces a shortage of skilled professionals.


 Rapid Technological Changes: Keeping up with fast-evolving technologies and threats.
 Ethical Dilemmas: Balancing privacy, surveillance, and security.
 Stress and Burnout: High-pressure environment leading to professional burnout.

7. What is the primary goal of risk assessment in information security?

 dentifying Potential Risks: Understanding the threats and vulnerabilities that could impact the
organization.
 Evaluating Impact and Likelihood: Assessing the potential impact and likelihood of identified
risks.
 Prioritizing Risks: Determining which risks need immediate attention and resources.
 Informing Risk Mitigation Strategies: Guiding the development of strategies to mitigate or
accept risks.

You might also like